The section includes several chapters for explaining these security operations. There is a chapter which describes how essential is the review of some of the overall best practices that many organizations follow in implementing and then maintaining network security operations in their environments.

You can also find in this section, a chapter which describes a best practice workflow for using USM Anywhere to perform operations during the entire Security Monitoring and Management lifecycle.

You can also find information about how you can use the USM Anywhere web UI to verify that it is operating properly after the basic installation and configuration of your USM Anywhere system.

Finally, in this section, there is a chapter on which you will find how you could establish a Baseline Network Behavior for what constitutes normal behavior in your network. Through this baseline, you could evaluate results and filter out the noise to identify and filter out right away some false positives.